963 resultados para Key Recovery Attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Compressive Sensing (CS) theory combines the signal sampling and compression for sparse signals resulting in reduction in sampling rate. In recent years, many recovery algorithms have been proposed to reconstruct the signal efficiently. Subspace Pursuit and Compressive Sampling Matching Pursuit are some of the popular greedy methods. Also, Fusion of Algorithms for Compressed Sensing is a recently proposed method where several CS reconstruction algorithms participate and the final estimate of the underlying sparse signal is determined by fusing the estimates obtained from the participating algorithms. All these methods involve solving a least squares problem which may be ill-conditioned, especially in the low dimension measurement regime. In this paper, we propose a step prior to least squares to ensure the well-conditioning of the least squares problem. Using Monte Carlo simulations, we show that in low dimension measurement scenario, this modification improves the reconstruction capability of the algorithm in clean as well as noisy measurement cases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Methylenetetrahydrofolate dehydrogenase-cyclohydrolase (FolD) catalyzes interconversion of 5,10-methylene-tetrahydrofolate and 10-formyl-tetrahydrofolate in the one-carbon metabolic pathway. In some organisms, the essential requirement of 10-formyl-tetrahydrofolate may also be fulfilled by formyltetrahydrofolate synthetase (Fhs). Recently, we developed an Escherichia coli strain in which the folD gene was deleted in the presence of Clostridium perfringens fhs (E. coli Delta folD/p-fhs) and used it to purify FolD mutants (free from the host-encoded FolD) and determine their biological activities. Mutations in the key residues of E. coli FolD, as identified from three-dimensional structures (D121A, Q98K, K54S, Y50S, and R191E), and a genetic screen (G122D and C58Y) were generated, and the mutant proteins were purified to determine their kinetic constants. Except for the R191E and K54S mutants, others were highly compromised in terms of both dehydrogenase and cyclohydrolase activities. While the R191E mutant showed high cyclohydrolase activity, it retained only a residual dehydrogenase activity. On the other hand, the K54S mutant lacked the cyclohydrolase activity but possessed high dehydrogenase activity. The D121A and G122D (in a loop between two helices) mutants were highly compromised in terms of both dehydrogenase and cyclohydrolase activities. In vivo and in vitro characterization of wild-type and mutant (R191E, G122D, D121A, Q98K, C58Y, K54S, and Y50S) FolD together with three-dimensional modeling has allowed us to develop a better understanding of the mechanism for substrate binding and catalysis by E. coli FolD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diaminopropionate ammonialyase (DAPAL), a fold-typeII pyridoxal 5-phosphate-dependent enzyme, catalyzes the ,-elimination of diaminopropionate (DAP) to pyruvate and ammonia. DAPAL was able to utilize both d- and l-DAP as substrates with almost equal efficiency. Mutational analysis of functionally important residues such as Thr385, Asp125 and Asp194 was carried out to understand the mechanism by which the isomers are hydrolyzed. Further, the putative residues involved in the formation of disulfide bond Cys271 and Cys299 were also mutated. T385S, T385D sDAPAL were as active with dl-DAP as substrate as sDAPAL, whereas the later exhibited a threefold increase in catalytic efficiency with d-Ser as substrate. Further analysis of these mutants suggested that DAPAL might follow an anti-E-2 mechanism of catalysis that does not involve the formation of a quinonoid intermediate. Of the two mutants of Asp125, D125E showed complete loss of activity with d-DAP as substrate, whereas the reaction with l-DAP was not affected significantly, demonstrating that Asp125 was essential for abstraction of protons from the d-isomer. By contrast, mutational analysis of Asp194 showed that the residue may not be directly involved in proton abstraction from l-DAP. sDAPAL does not form a disulfide bond in solution, although the position of Cys299 and Cys271 in the modeled structure of sDAPAL favored the formation of a disulfide bond. Further, unlike eDAPAL, sDAPAL could be activated by monovalent cations. Mutation of the cysteine residues showed that Cys271 may be involved in coordinating the monovalent cation, as observed in the case of other fold-typeII enzymes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive public communication that by itself does not give away the value of the function. In many cases, we strengthen and improve upon previously known converse bounds. Our results are single-shot and use only the given joint distribution of the correlated observations. For the case when the correlated observations consist of independent and identically distributed (in time) sequences, we derive strong versions of previously known converses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Biogenesis of the iron-sulfur (Fe-S) cluster is an indispensable process in living cells. In mammalian mitochondria, the initial step of the Fe-S cluster assembly process is assisted by the NFS1-ISD11 complex, which delivers sulfur to scaffold protein ISCU during Fe-S cluster synthesis. Although ISD11 is an essential protein, its cellular role in Fe-S cluster biogenesis is still not defined. Our study maps the important ISD11 amino acid residues belonging to putative helix 1 (Phe-40), helix 3 (Leu-63, Arg-68, Gln-69, Ile-72, Tyr-76), and C-terminal segment (Leu-81, Glu-84) are critical for in vivo Fe-S cluster biogenesis. Importantly, mutation of these conserved ISD11 residues into alanine leads to its compromised interaction with NFS1, resulting in reduced stability and enhanced aggregation of NFS1 in the mitochondria. Due to altered interaction with ISD11 mutants, the levels of NFS1 and Isu1 were significantly depleted, which affects Fe-S cluster biosynthesis, leading to reduced electron transport chain complex (ETC) activity and mitochondrial respiration. In humans, a clinically relevant ISD11 mutation (R68L) has been associated in the development of a mitochondrial genetic disorder, COXPD19. Our findings highlight that the ISD11 R68A/R68L mutation display reduced affinity to form a stable subcomplex with NFS1, and thereby fails to prevent NFS1 aggregation resulting in impairment of the Fe-S cluster biogenesis. The prime affected machinery is the ETC complex, which showed compromised redox properties, causing diminished mitochondrial respiration. Furthermore, the R68L ISD11 mutant displayed accumulation of mitochondrial iron and reactive oxygen species, leading to mitochondrial dysfunction, which correlates with the phenotype observed in COXPD19 patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Single scan longitudinal relaxation measurement experiments enable rapid estimation of the spin-lattice relaxation time (T-1) as the time series of spin relaxation is encoded spatially in the sample at different slices resulting in an order of magnitude saving in time. We consider here a single scan inversion recovery pulse sequence that incorporates a gradient echo sequence. The proposed pulse sequence provides spectra with significantly enhanced signal to noise ratio leading to an accurate estimation of T-1 values. The method is applicable for measuring a range of T-1 values, thus indicating the possibility of routine use of the method for several systems. A comparative study of different single scan methods currently available is presented, and the advantage of the proposed sequence is highlighted. The possibility of the use of the method for the study of cross-correlation effects for the case of fluorine in a single shot is also demonstrated. Copyright (C) 2015 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Single scan longitudinal relaxation measurement experiments enable rapid estimation of the spin-lattice relaxation time (T-1) as the time series of spin relaxation is encoded spatially in the sample at different slices resulting in an order of magnitude saving in time. We consider here a single scan inversion recovery pulse sequence that incorporates a gradient echo sequence. The proposed pulse sequence provides spectra with significantly enhanced signal to noise ratio leading to an accurate estimation of T-1 values. The method is applicable for measuring a range of T-1 values, thus indicating the possibility of routine use of the method for several systems. A comparative study of different single scan methods currently available is presented, and the advantage of the proposed sequence is highlighted. The possibility of the use of the method for the study of cross-correlation effects for the case of fluorine in a single shot is also demonstrated. Copyright (C) 2015 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Natural disasters pose a threat to isolated populations of species with restricted distributions, especially those inhabiting islands. The Nicobar long tailed macaque. Macaca fascicularis umbrosus, is one such species found in the three southernmost islands (viz. Great Nicobar, Little Nicobar and Katchal) of the Andaman and Nicobar archipelago, India. These islands were hit by a massive tsunami (Indian Ocean tsunami, 26 December 2004) after a 9.2 magnitude earthquake. Earlier studies Umapathy et al. 2003; Sivakumar, 2004] reported a sharp decline in the population of M. f. umbrosus after thetsunami. We studied the distribution and population status of M. f. umbrosus on thethree Nicobar Islands and compared our results with those of the previous studies. We carried out trail surveys on existing paths and trails on three islands to get encounter rate as measure of abundance. We also checked the degree of inundation due to tsunami by using Normalized Difference Water Index (NDWI) on landsat imageries of the study area before and after tsunami. Theencounter rate of groups per kilometre of M. f. umbrosus in Great Nicobar, Little Nicobar and Katchal was 0.30, 0.35 and 0.48 respectively with the mean group size of 39 in Great Nicobar and 43 in Katchal following the tsunami. This was higher than that reported in the two earlier studies conducted before and after the tsunami. Post tsunami, there was a significant change in the proportion of adult males, adult females and immatures, but mean group size did not differ as compared to pre tsunami. The results show that population has recovered from a drastic decline caused by tsunami, but it cannot be ascertained whether it has reached stability because of the altered group structure. This study demonstrates the effect of natural disasters on island occurring species.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three kinds of forebody model of hypersonic vehicles were studied with numerical simulation method. It shows that the two- order compressive ramp model is the best selection among the three for its good evaluative parameters value at the cowl of the inlet . This model can provide higher value of flux coefficient and total pressure recovery coefficient and lower average Mach number compared with those of the other two models . Simultaneously different compressive angles may have different effects . The configuration which the firstorder of compressive angle is 4°and the second 5°is the optimum combination. Furthermore factors such as attack angle were concerned. Better result may be obtained with a range of attack angles . Based on the work above the integrated design for forebodyPinlet of a hypersonic vehicle was performed. The numerical result shows that this integrated model provides good flow field quality for inlet and engine work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drop tower is an important ground based facility for microgravity science experiment. The technical performances of the drop tower NMLC are advanced compared with similar facilities in the US, Germany and Japan. The main components such as drop capsule, deceleration devices, release mechanism present its advantages and creativities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Humans appear to have an inherent prosocial tendency toward one another in that we often take pleasure in seeing others succeed. This fact is almost certainly exploited by game shows, yet why watching others win elicits a pleasurable vicarious rewarding feeling in the absence of personal economic gain is unclear. One explanation is that game shows use contestants who have similarities to the viewing population, thereby kindling kin-motivated responses (for example, prosocial behavior). Using a game show-inspired paradigm, we show that the interactions between the ventral striatum and anterior cingulate cortex subserve the modulation of vicarious reward by similarity, respectively. Our results support studies showing that similarity acts as a proximate neurobiological mechanism where prosocial behavior extends to unrelated strangers.